Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
3K views
COMPUTER APPLICATIONS - Text Book
These are the documents of the computer
Uploaded by
MONICA JOYAL
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save COMPUTER APPLICATIONS - Text book For Later
Download
Save
Save COMPUTER APPLICATIONS - Text book For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
3K views
COMPUTER APPLICATIONS - Text Book
These are the documents of the computer
Uploaded by
MONICA JOYAL
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save COMPUTER APPLICATIONS - Text book For Later
Carousel Previous
Carousel Next
Download
Save
Save COMPUTER APPLICATIONS - Text book For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 226
Search
Fullscreen
Ss COMPUTER APPLICATIONS E oe s ~ with Cyber-Safety, Scratch & Python Fences (CBSE CODE 165) Revised & Updated Edition Strictly as per the revised CBSE syllabus Concise, comprehensive and easy language. __,. Solved questions with each chapter. a | Latest recommended technology and software. \ Hands on projects for practical learning. \\ Q@000 An ISO Certified CompanyCOMPUTER APPLICATIONS with Cyber-Safety, Scratch & Python (CBSE CODE 165) Revised & Updated Edition (0 0) . Based on Updated CBSE Syllabus CONCEPT BY COMPOSED BY CONTRIBUTIONS) Gagan Agarwal David Singh: Gareema Balwani (Founder & M.D.) (CLP MCA, 25 yrs exp. with NIIT) Hitesh SainiPREFACE With sudden increase in the usage of computer and software globally, schools are focusing on computer education with the BEST (BEYOND IMAGINATION, EXCELLENT, SYSTEMATIC, TEACHING PLAN) learning technique. But the study material used was not fulfilling the requirement of modern BEST based training, followed with traditional educational methodology with outdated software versions, Computer Applications for Class IX is the latest and advanced computer book which has been prepared, keeping in mind the interest of students and teachers in the field of Information Technology. In compliance with the prescribed curriculum, this book covers basics of information technology, networking, cyber safety, Office productivity tools and programming basics with Scratch and Python. ‘The book is designed with an interactive and hands-on approach to communicate the essential aspects of computer. We have used simple language in the entire series for precise and better understanding. SPV a Cae oes “Chapter focuses on"-a brief overview of the chapter. «Use ofmore pictures to make theory interesting. + "Youhavelearned"-a complete summary of the chapter, * "Activity Time" and "Lab Activities"- for practice. + "Tips" and "Do You Know"- for additional information. + Allthe definitions have been highlighted for better impact. + Usage of latest technology and softwares to make the learning effective & industry relevant. We welcome your valuable feedback to improve the content and the presentation of the chapters. Please contactus at eduitsp|@gmail.comCOURSE STRUCTURE Learning Outcomes: Ability to createa simple website Ability to embed images, audio and video inan HTML page Ability to use style sheets to beautify the web pages. Ability to write iterative programs with Scratch/Python, Ability to Interfacea web site with a web server and record the details of auser's request. Ability to follow basic cyber ethics. Ability to familiarize with network concepts Nausene Distribution of Marks and Periods Regular Curriculum —_Revised Curriculum* Unit Periods Periods Unit Name Marks Marks No. Theory | Practical Theory | Practical] 1 Networking 10 05 os | as | a7 05 2 | HTML 20 30 so | 25 | 30 50 3 Cyber ethics 10 05 1o | 10 | 08 10 4 Scratch/Python Theory 10 15 60 ; ; 5 Practicals 50 - ; 50 : Total 100 «55 —S125-| 200 | 55 o “Revised curriculum has Scratch/Python deducted. Unit 1: Networking Internet: World Wide Web, web servers, web clients, web sites, web pages, web browsers, blogs, news groups, HTML, web address, e-mail address, downloading and uploading files from a remote site. Internet protocols: TCP/IP, SMTP, POP3, HTTP, HTTPS. Remote login and file transfer protocols: SSH, SFTP, FTP, SCP, TELNET, SMTP, TCP/IP. Services available on the internet: information retrieval, locating sites using search engines and finding people on then Q Web services: chat, email, video conferencing, e-Learning, e-Banking, e-Shopping, e- Reservation, e-Governance, e-Groups, social networking QQ Mobile technologies: SMS, MMS, 3G, 4G. Introduction to web page designing using HTML: create and save an HTML document, accessa web page usinga web browser. (HTML tags: html, head, title, body, (attributes: text, background, bgcolor, link, vlink, alink), br (break), hr(horizontal rule), inserting comments, h1.h6 (heading), p (paragraph), b (bold), i (italics), u (underline), ul (unordered list), ol (ordered list), and li (list item). Description lists: dl, dtand dd. Attributes of ol (start, type), ul (type)QQ Fonttags (attributes: face, size, color). QQ _Insertimages: img (attributes: src, width, height, alt), sup (superscript), sub (subscript) Q HTML Forms: Textbox, radio buttons, checkbox, password, list, combobox. Q Embedaudioand video inalITML page. Q Createatable using the tags: table, tr, th, td, rowspan, colspan. a a Links: significance of inking, anchor element (attributes: href, mailto), targets. Cascading style sheets: colour, background-colour, border-style, margin, height, width, outline, font (family, style, size), align, float. -yber ethics Netiquettes. Software licenses and the open source software movement. Unit: a Q (Intellectual property rights, plagiarism and digital property rights. Qa Freedom of information and the digital divide. Q E-commerce: Privacy, fraud, secure data transmission. Unit4: Scratch or Python (Theory and Practical) Alternative : Scratch (Revision of the basics of Scratch Sprite, tempo, variables, and events, Coordinates and conditionals. Drawing with iteration. ooog Update variables repeatedly, iterative development, ask and answer blocks. (CQ Create games, animated images, stories and songs. Alternative 2: Python - (provided as an option to children with special needs) Q Revision of Python basics. Conditionals: if, if-else statements Loops: for, while (e.g,, sum of first 10 natural numbers). Practice simple programs. oooLab Exercises coogoococa o Create staticweb pages. Use style sheets to enforcea format inan HTML page (CSS). Embed pictures, audio and videos in an HTML page. ‘Add tablesand framesin an HTML page. Decorate web pages using graphical elements. Createa website using several webpages. Students may use any open source or proprietary tool Work with HTML forms: text box, radio buttons, checkbox, password, list, combo box. Writeablog using HTML pages discussing viruses, malware, spam and antiviruses. Create a web page discussing plagiarism. List some reported cases of plagiarism and the consequent punishment meted out. Explain the nature of the punishment in different countries as per their IP laws. Create simple stories with Scratch (involving at least two objects/characters) and iteration OR write programs for finding the sum/product of first n natural numbers using Python. . Regular _ Revised Breakup of marks for the Practicals curriculum Curriculum* Serial Unit Name Marks Marks 1. Lab Test 30 Marks 20 Marks HTML (design one web page based onadiagram) 15 20 Scratch or Python (write one program) 15 : 2. Report File + viva 10 Marks 20 Marks Report file: Revised (Report file): +) Atleast 10 HTMLpages,and + At least 10 HTM at east 5 Scratch/Python pages 8 15 brograms. Viva voce (based on the report file) 2 5 3, Project (thatuses mostofthe conceptsthathave been learnt) 10 (10 marks) Total (50 marks)ConrtTeNTS- X UNIT- 1: NETWORKING 1, Introduction to the Internet History of the Internet Communication and working of Internet Who Manage and control the Internet Application of Internet Important terminology related to Internet 2, Internet and Web Services Steps to connect PC to Internet Retrieve Information from internet Application of E-mail Chatting and video conferencing Protocols (FTP and Telnet) Blogs, Newsgroup, E-learning and E-commerce Online shopping and reservation Social networking and Web 2.0 UNIT: 2: HTML, 3, Introduction to HTML Introduction of HTML, Work on HTML and Structure of HTML HTML Tags and Attributes and Tag types Getting started with HTML Programming Center, Heading, Break Line and Horizontal Line tag 4, Formatting in HTML (64-73) Formatting tags Font, Paragraph, Big, Small tags Bold, Italic, Underline, Strike tags Color Names and Symbols code 5. Images, Links, Lists, Tables and Forms ‘The Image Tag ‘The Hyperlink Tag Lists in HTML Ordered, Unordered and Nested Marquee Tag and it's behavior Introduction to Table Element (07-21) (22-53) (54-63) (74-106) a ‘The table tag and it's attributes ‘Th, Tr and Ta Tags Rowspan and Colspan attributes HTML Forms 6. Cascading Style Sheets (107-132) Introduction to CSS Introduction to DETML Various ways to define style sheets Various ways to apply style sheets on HTML elements. Style sheet Properties UNIT: 3: CYBER ETHICS 7. Cyber ethics E-Commerce and cyber ethies Intellectual Property Rights and digital property Open source software and open source licenses UNIT: 4: SCRATCH/PYTHON THEORY 8. Scratch Programming - IL (145-167) Event Handling, sprite Movement, Sound blocks Using variables, generating random numbers Control blocks, Operator blocks, drawing with Pen. 9. Python Revision (168-188) Python features, Python IDLE & Python working modes Variable, data types and data type conversion Arithmetic and assignment operators in Python 10. Python Level - II (189-204) Collections - lists, tuples and dictionary Literals, relational and logical operators if construct, if-else construct, while loop and for loop (133-144) SUPPLEMENT: ARTIFICIAL INTELLIGENCE (205-208) PROJECTS (209-211) SAMPLE SOLVED QUESTION PAPER (212-215) SAMPLE SOLVED QUESTION PAPER-2 (216-220) SAMPLE UNSOLVED QUESTION PAPER-A (221-222) SAMPLE UNSOLVED QUESTION PAPER-2 (223-224) —aINTRODUCTION TO THE INTERNET CHAPTER FOCUSES ON Y Introduction to Internet Y Who Manage the Internet? Y History of Internet Y Application of Internet Y Communication and working of Internet Y Important terminologies related to Internet INTRODUCTION TO INTERNET The Internet has provided an important medium to share the knowledge and stay in touch with each other anywhere in the world, Internet is the quickest and easiest way of communication with others. You can use email to share the information, pictures, videos etc. over the internet. Remember those days when you have to wait for hours in along queue to deposit or withdraw money from a bank. Well, these days are now history. Now you can save your time and energy by using services of e-banking, online reservation, etc. ‘The Internet is a worldwide, publicly accessible network of interconnected computer networks that used to transmit data across the world. The Internet is a global network of computers, each computer connected to the Internet musthavea unique address. This address is knownasan|P address. Itisa ‘network of networks’ that consists of millions of domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, the interlinked Web pages and other documents of the World Wide Web. Internet is also used for providing services like E-banking, Blogging, Online shopping, Social networking etc. You willlearn aboutall these services in thenext chapter History of Internet ‘The Internet's growth has become explosive and it seems impossible to escape the bombardment of www.com which is seen constantly on television, magazines and heard on radio, Because the Internet has become such a large part of our lives, a good understandingis required to use this new tool mosteffectively. ‘The foundation of Internet was laid by the Department of Defense, USA in 1969. This network was named as ARPANET. This was the first step towards the creation of the Internet. Internet, however, came to the existence in proper way inthe 1990's, In 1969, the University of California at Los Angeles and the University of Utah were connected with the beginning. of the ARPANET (Advanced Research Projects Agency NETwork) using 56 kbit/s circuits, which is sponsored by US. (United States) Department of Defense (DoD). The goal of this project was to connect computers at different Universitiesand U.S. (United States) defense. In mid 80's another federal agency, the National Science Foundation (NSF) created a new high capacity network called NSFnet (National Science Foundation Network), which was more capable than ARPANE', The only drawback of NSFnet was that itallowed only academic research on its networkand not any kind of private business onit, Now, several private organisations and people started working to build their own networks, named private networks, which were later (in 1990's) connected with ARPANET and NSFnet to form the Internet. The Internet really became popular in 1990'safter the development of World Wide Web (WWW).The Internet was the result of some visionary thinking by people in the early 1960s that saw great potential value in allowing computers to share information on research and development in scientific and military fields. ARPANET was the biggeststep in developmentof internet, Some key points ofinternethistory:- © — TheInternet matured in the 70'sasaresultof the TCP/IP architecture, © Similarly, BITNET (Because It's Time Network) connected IBM mainframes around the educational community and the world to provide mail services beginning in 1981. J.CR, Licklider of MIT first proposed a global network of computers in 1962, and moved over to the Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it. © In 1986, the National Science Foundation funded NSF-Net as a cross country 56 Kbps backbone for the Internet. As the commands for e-mail, FTP, and telnet were standardized, it became a lot easier for non- ‘technical people to learn to usenet. In 1991, the first user friendly interface to the Internet was developed at the University of Minnesota. As the Internet has become faster and increasingly accessible to non-technical communities, social networking and collaborative services have grown rapidly, enabling people to communicate and share interests in many more ways, Communication and working of internet Internet refers to a collection of infinite number of computers that are spread across the globe, It is a global network of similar or dissimilar networks across the world, with a purpose of sharing resources and to communicate with each other. Itis also called as network of networks. Ina network, multiple computers across the world are connected with each other through different devices like wires, satellite etc. All computers network use protocol for communication. In this way different computers communicate with each other through internet asa single platform, ‘The computers on the Internet are connected to each other through small networks, These networks are connected through the gateways to the Internet backbone, All computers on the Internet, communicate with one another using TCP/IP, which is a basic protocol (ie. set of rules) of the Internet. TCP/IP (Transmission Control Protocol/Internet Protocol) manages the transmission of data/file/document on the Internet by breaking the data/ile document into small pieces or parts called packets ordatagrams. Each packet contains actual data and address part, ie. addresses of destination and source. Functioning of TCP and IPareas follows: © TCP Itbreaks message into smaller packets that are transmitted over the Internet and also reassembles these smaller packets into the original message that are received from the Internet, @ | [PIthandles the address part of each packet, so that the data is sent to the correct address. Each gateway on the network check this address to see where to forward the message, Who Governsthe Internet? Internet is not governed by any single organisation, Some volunteer groups had been formed to help, co-ordinate and wrist with the developmentofthe Internet. These organisations areas follows: @ Internet Architecture Board (IAB) Itis a technical advisory group of the Internet society and is chartered to provide oversight of the architecture of the Internet, its protocols and resources.Internet Engineering Task Force (IETF) Itdevelops and maintains the Internet's communication protocols. © Internet Research Task Force (IRE) It looks into long-term research problems that could be critical in five or tenyears, @ Internet Network Information Center (InterNIC) It provides various registry services needed for the Internet to operate effectively, © World Wide Web Consortium (W3C) Itdevelops standards for the evolution ofthe Web. © Internet Society (ISOC) It concerns with the growth and evolution of the Internet and the way in which the Internet canbe used. Some Networking Devices 1. Modem andit's working: Modem takesit's name from the words Modulator- Demodulator which is actually a device and used for conversion of data signals. It enables a computer to receive and transmit data over the network, Computer information is stored digitally whereas information transmitted over telephone linesin the form of analog signals. ‘Amodem converts between these two forms:- ‘Mo-Modulation:- Conversion of digital data to analog data. Dem-Demodulation:- Conversion of analog datatto digital data. “oy Modem Router Repeater 2, _ Router:- Router is small physical device that join multiple networks together. It forwards data packets from onenetwork to the othernetwork. 3, _ Repeater:- Repeater is a network device that retransmits a received signal with more power to an extended geographical area. A repeater is implemented in computer networks to expand the coverage area of the network, 4, Gateway: Gateway is a network point that acts as an entrance from one network to another network, A network gateway canbe implemented completely in software or hardware, orasa combination ofboth World Wide Web (WEB) It is a system of Internet servers that supports hypertext and multimedia to access several Internet protocols on a single interface, It is often abbreviated as the Web or WWW, It is a way of exchanging information between computers on the Internet, trying to tie them together into a vast collection of interactive multimedia resources. Itis only portion of what makes up the Internet, butitis the fastest growing part of the Internet, The WWW is a set of programs, standards and protocols governing the way in which multimedia files (text,photographs, graphics, audio and video) are created and displayed onthe internet.Difference between internetand www Internet is massive network of networks, a networking infrastructure, It connects millions of computers together globally forming a network in which any computer can communicate with any other computer a long as both are connected to internet, www is a way of accessing information over the medium ofthe internet, Itisan information sharing model thatis built onthe top of internet. ‘The web uses HTTP protocol, to transmit data. It is also utilizes browsers such as internet explorer or firefox to access web documents called web pages that are linked via hyperlinked. Itwas created by Tim Berners lee in 1992. 3, Information that travels over the internet does, sovviaa variety oflanguages know as protocols. 4, It does not utilize web browsers, It is the structure on which wwwis based. It provides the dynamic networks via a variety Nosuch creator. of differentmethodologies and protocols. Internet provides the structure. Applications of Internet © E-mail: By using internet we can communicate in a fraction of seconds with a person who is sitting in the other partof the world, Today forbetter communication, we can avail the facilities of e-mail, © Social Networking: Today social networking sites have become an important part of the online community. Anumber of people use this facility to remain in touch with their nearsand dears. © E-Commerce (Online Shopping): In today's busy life most of us are interested to shop online. In countries like USA, most of consumers prefer to shop from home. We have many shopping sites on internet like amazon.com, snapdeal.com, ebay.com, flipcart.com, junglee.com, ete, Virtually anything can be bought or sold on the internet. © Entertainment: On internet we can find all forms of entertainment from watching films to playing games online © Information: Information can be taken on any topic on the internet. It can be from any source worldwide that has a presence on the Internet. For example, Agriculture Advisers, Colleges, Universities, Banks, Purchasers and Supply companies, © Business tools: Online management and bu: currency converters, © Discussion groups: Itis used to exchange your views with others over the Internet about your interests and views. Discussion groupsarealso very famous nowadays. ess tools are very popular For example, online banking or © _ Other Services: Many services are provided on the internet such as online banking, job seeking, purchasing tickets for your favorite movies, paying bills, etc, ACCESSING THE INTERNET Dial-up Connection A dial-up connection is used when your computer connects to internet via public switched telephone network (PSTN). Dial-up connection isa temporary connection.Some features ofa Dial-up connection. © Tiesupatelephoneline for connecting to the Internet. © Speedisuptoamaximum of 56 Kbps. © Internetisnotalways connected. © Good availability since it does notrequire any extra infrastructure other than telephone lines © Notsuitable for online gamingand video chat where we need high speed. Broadband Connection Broadband is made of two words Broad and Bandwidth, Broadband is often used to refer to a high bandwidth. Havinga broadband connection means your web pages will load much faster than they do using your phone line. It providesaspeed of 512 kbps or more. Some features ofa broadband connection: 1, Itfacilitates fast data transfer in large volumes. 2. The broadband Internet provides fast connecting speeds that are many time higher than the traditional dial- up connection, 3, Abroadband Internet connection can be kept connected to the Internet continuously without attracting any additional charges. This also avoids frequent dialing or logging on to the provider's service while accessing the Internet, 4, Wecanmakea telephone call while working on the Internet. 5, Therunning costis comparatively less in case of broadband connections as compared to dial up services. 6. Therearealso many attractive plans for continuous usersand business people, Wireless Connection Wireless networking is a method of transferring data between computers and other networking devices using radio frequency waves called Wi-Fi signals, or wireless signals, rather than physically connecting devices with cables. Computers must have a wireless adapter for wireless connectivity. Advantages: ‘Access: A Wi-Fi networkallows much easier access compared to a wired network. You can move computers without having to rewire or change settings. Laptops become truly portable, allowing you access anywhere within the wireless range. Tidiness: A Wi-Finetwork means that you are no longer required to have large numbers of cables connecting. across your office. You can also allow access to shared printers and other devices, which further reduces the number of cablesand wires needed, ii, Easier Upgrading: One of the main advantages of a wireless network is that you can add another computer more easily than ona wired network. This reduces the cost of upgrading or adding to your computers iv. Connect while Travelliny while travelling, Connecting Your PC to Internet (using broadband connection) ‘You need to subscribe to an Internet Service Provider (ISP) and a device known as modem to access the internet, Following items you will need to connect your PC to the Internet: DSLmodem, Ethernet cables/phone cable and /or installation disc/PC suite Disc.) Once you have all the above items, you will need to connect your computer with modem. Follow these steps to connect PC to internet:- Ifyou have a laptop with the internet data- card, you can connect to the internetoutlet, = 1. Plugthedevice (modem) into an elect 2. Plug one end of a phone cord or cable into the wide nercelt area network (WAN) port of the device, and then plug the other end into the wall jack (splitter). The Ss eye WAN port should be labeled 'WAN’. (DSL users: Do g notusea DSL filter on the phone line.) a - network (LAN) port on the device, and then plug the pra other end into the networking port of the computer Serc that you want to connect to the Internet. The LAN port should be labeled LAN’, (Ifyou are connecting wirelessly, skip thisstep.) Teer Computer 4, Open the Connect to the Internet wizard by clicking the Start button ® Control Panel, clicking Network and Internet ® Networkand Sharing Center ® Set up a connection or network. 5, TheSetUpaConnection or Network dialog boxappears. 6, Clickon Connectto the Internet option and follow the instructions to complete the wizard. INTERNET TERMINOLOGY Client: Any computer thatrequests services from another computer on any network or on the internet. Server: Any computer that receives the request form client computers, process itand sends the outputto client. A Web Server is a computer that stores web pages. Itis responsible for accepting request(s) from users and serves them with web pages. Two important web server programs are: IIS (Internet Information server) and Apache, etc. Web servers are connected to the Internet 24 hoursa day, seven daysa week. Internetis based on Client-Server Architecture, Web Page: A web page (such as the one you are looking at now) is an electronic document written ina computer language called HTML (l1ypertext Markup Language).Web pages can contain text, graphics, video, animation, and, sound, as well as interactive features, such as data entry forms. Each page has a unique address known as a URL (Uniform Resource Locator) that identifies its location on the server, Web pages usually contain hyperlinks to other web pages. Website: A website (often shortened to just site) is one or more web pages, belonging to a particular company, institute, government or an individual. The first page is called the home page, which acts like an index, indicating the content on the site. By default the home page is named as index.htm. From the home page, you can click hyperlinks to access other web pages. Web Portal: A web portal is a customized website that immerses information from a wide array of sources in a consistent and uniformed manner. Web Browser: A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer to access and display documents, view pictures, hear sound, and view video clips from the World Wide Web. URL : An addressing scheme that is used on the Internet to locate resources and/or services on the World Wide Web. Basically the URL is the address of a computer file that has been put on a computer server to access the Internet. URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given unique resource onthe Web. DOMAIN NAME eee http://www.verisign.com/domain-names/online/index.xhtml 4 URLElements of URL: © Thetype of server or protocol http or ftp. © Thename/address of the server on internet(Domain Name) © | Thelocation offileon server{knownaspath), Newsgroup : A newsgroup is an online discussion forum accessible through Usenet. Each newsgroup contains discussions abouta specific topic, indicated in the newsgroup name, You can browse newsgroups and post or reply to topics using anewsreader program, Email : An email is an electronic letter or message that is sent electronically between different recipients threw mail exchange servers on the server. An email can contain attachments (files) that get sent along with the contents ofthe email message, Email Address:
[email protected]
© Abe ee @ Domainname gmail.com Server vs. Web Server Aserveris computer or software or device on a network that manages network resources. A server serves requests mainly related to resources on the network such as for sharing a resource like printer, storage, software etc. There are many different types of servers database servers, file servers, mail servers, print servers, web servers, game servers, and application servers. Services Provided bya Server — @ Equipment /Resource Sharing. © Centralised File Saving for Data Sharing, © Centralised Virus Scanning © Centralised Backups. Web server is a computer where the web content is stored. Basically web server is used to host the web sites but there exists other web servers also such as gaming, storage, FTP, email etc. When client sends request for a web page, the web server search for the requested page if requested page is found then it will send it to client with an HTTP response. Ifthe requested web page is not found, web server will the send an HTTP response:Error 404 Not found. Services of Web Server: © Serving Web Pages. Running gateway programs(CGl) and returning output. Controlling access to server. Monitoring and loggingall access. Server side scripting.WEB CLIENT Web client is an application that communicates with a web server using an HTTP protocol. A web clients defined asa computer that receives from and gives information to the web server. Example of web clientisa web browser. It is also called as thin browser because it does not execute heavy-duty operations such as querying databases, performing complex business tasks or connecting tolegacy applications. Itconsists of the following two components: © Dynamicwebpage © Webbrowser Dynamic web pages are produced by components that run in the web tier whereas a web browser delivers web pages received from the server. Website and Webpage Components of Web Site © Web host : Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet. When a hosting provider allocates space on a web server fora website to store its files, they are hosting a website, Web hosting makes the files that comprise a website (code, images, etc.) available for viewing online. Every website you've ever visited is hosted on aserver. Address: url of website Homepage Design Content Components of a Web Page based on: © Content Wise: text, mages, graphics, audio, video, hyperlinks © Structure Wise: Page Title Header of web page Body of Web Page 7 Links to otherweb pages or websites NAN % Footer Difference between website and webpage A website is a collection of interlinked web pages organised on a web server while a web page contains relevant information. A web page contains hyperlinks to other web pages on the web site or to the pages on other web sites. Web Browser Typesof Web Broswer 1. Textbased Web Browser : A text-based web browseris a web browser that renders only the text of web pages, and ignores graphic content. Under small bandwidth connections, usually, they render pages faster than graphical web browsers, Text-based browsers are often very useful for users with visual impairment or partial blindness. They are especially useful with speech synthesis or text-to-speech software, which reads content to users. Lynx, w3m, webbie. 2, Graphical based web browser: Graphical browsers display text, images, and other web applications including video and audio files (as compared with text-only browsers).Blog A blog is an online diary or journal located on a website. The content of a blog typically includes text, pictures, videos, animated GIFs and even scans from old physical offline diaries or journals and other hard copy documents. Blogposts: The updates put on the blog by the blogger are called blog-posts, Personal Blog: This is the most common type of blog. Maximum numbers of blogs on Internet belong to this category. A personal blog is very different from the other types of blogs because it contains opinions and beliefs of the blogger: A typical blogger may keen on posting stories about their interest such as fishing, dancing, or colleting something, Company Blog/Business Blog: One of the best ways to demonstrate your knowledge and expertise is with a business blog, A business blog contains content focused on an area of specialty to attract the attention of potential clients, The business or blog owner makes money through the products and services they offer to the readers. News Blog: News blogs are more formal than the other type of blogs and often require a massive team and budget to maintain. This type of blog contains factual stories about News, maintained by journalists. News and television companies have many professional journalists who post stories, news and views about the latest events. Micro Blog: A microblog is a short piece of content designed for quick audience interactions, Microblogging is a combination of instant messaging and content production. With a microblog, you share short messages with an online audience to improve engagement. Social channels like Twitter, Instagram, Facebook and Pinterest offer popular platforms for microblogging, Enables you to write down your thoughts on anything thatinterests you, ‘Whatever you publish is available for everyonetosee, Ifyou writea post in anger you might regret it later Very quick and easy to set up, don't need much technical knowledge. Personal blogs may be biased or contain inaccurate information. Easy and quickto update oradd new posts. Blogs can be time consuming. Finding time to write regularupdates can becomea chore. People can leave comments on your blog, People may leave rude or inappropriate comments. If you want to read other people's blogs there are literally millions to choose from. ‘There are many very dull blogs around. You may have tolookat many before you find some worth reading, Some most common Domains + .com-commercial + edu-education © mil-military ‘+ .net-Networkresources . + .co-company + ty-television Country-Code Domain Extensions ca(Canada) .cn (mainland China) au (Australia) in (India) nn (Netherlands) tuk (United Kingdom) (Russia) ‘br (Brazil) ‘+ -gov-government lorg-non profitorganization {t-international {ir (France) .ch (Switzerland) de (Germany) jp Gapan) mx (Mexico) no (Norway) se (Sweden) es (Spain)Newsgroups A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups. Usenet uses the Network News Transfer Protocol (NNTP). Newsgroup, Internet-based discussion group, similar toa bulletin board system (BBS), where people post messages concerning whatever topic around which the group is organized. You can post a message or reply toa message and news server postit for everyoneto read HTTP vs.HTTPS HTTP stands for Hypertext Transfer Protocol, and tis a protocol -or a prescribed order and syntax for presenting information - used for transferring data over a network. Mostinformation that is sent over the Internet, including website content, uses the HTTP protocol. Thereare two main kinds of HTTP messages: requests and responses. The S in HTTPS stands for "secure." HTTPS uses TLS (or SSL -Secure Sockets Layer) to encrypt HTTP _ wae requestsandresponses. Cr) a P ] © HTTP vs HTTPS TLS (Transport Layer Security) uses a technology ie eccirs Solera Norma rT called public key encryption: there are two keys, a public key and a private key, and the public key is shared with client devices via the server's SSL -@— certificate. When a client opens a connection with a server, the two devices use the public and private key to agree on new keys, called session keys, to encrypt further communications between them © HTTPURLinyourbrowser'saddress bars http://and the HTTPS URLishttps:// HTTPisunsecured while HTTPS is secured. HTTP sendsdata over port 80 while HTTPS uses port 443, e e © NoSsLcertificatesare required for HTTP, with HTTPS itis required that you have an SSL certificate, e HTTP doesn't require domain validation, where as HTTPS requires at least domain validation and certain certificates even require legal document validation. © Noencryption in HTTP, with HTTPS the datais encrypted before sending Glossary BITNET =: —_Because It's Time NETwork, FTP : _ FillTransferProtocol. TeP : Transmission Control Protocol IP : _ InternetProtocol. ISP : Internet Service Provider. w3c : WorldWide Web Consortium, IETF : Internet Engineering Task Force. ICANN : Internet Corporation for Assigned Namesand Numbers.You have learned The foundation of network waslaid by the Department of Defense, USA in 1969. Ina network multiple computers are connected with each other through different devices like wires, satellite, etc. Anetwork protocol defines rules and conventions for communication between network devices. TCP uses a set of rules to exchange messages with other Internet points at the information packet level. IP usesa set of rulesto send and receive messages at the Internetaddress level. W3Cis the main international standards organization for the World Wide Web, File Transfer Protocol, or FTP is a protocol used for transferring files from one computer to another - typically from your computer toa web server. HTTP isa network protocol used to deliver all files and other data (collectively called resources) onthe World Wide Web, Solved Questions 1. WhatisInternet? 4. Define the followingterms: ‘Ans. Internet refers to a collection of infinite number a) Surfing of computers that are spread all across the globe. ) Searchingthe internet IT is a global network of similar or dissimilar network across the world with a purpose of so | Ans: ®) sing ~ Iemeans retrieving information from that users can share resources and communicate website using internet. with each other. It is also called as network of b) Searching the Internet:- Exploring various networks. websites and web pages on the internet for the 2. Whomanagesthe Internet? desired information. ‘Ans. Following are the organization who helps to | 5 Whatistheapplication oftheInternet? manage the Internet: Ans, Followingare the applications of Internet:- © W3C (World Wide Web Consortium). © Provides information about latest news. © INTERNET ENGINEERING TASK FORCE, © Provides information about medical issues. @ ICANN (Internet Corporation for Assigned © Provides information about latest jobs in Namesand Numbers) different fields 3. Whatisa Dial-up connection? © Allow facilities of social networking Ans. A dial-up connection is used when your @ Allow usto send SMS to mobile phones free of computer connects to internet via public costs. switched telephone network (PSTN). Dial-up | 6 — Define TCP/IP andits application. connection is a temporary connection that ties ne Ans, Transmission Control Protocol (TCP), which uses upatelephoneline for connecting to the Internet. Its Speed is up toa maximum of 56 Kbps. a set of rules to exchange messages with otherInternetpoints atthe information packet level. © Internet Protocol (IP) uses a set of rules to exchange messages over the internet. @ Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere onthe Internet. 8 ‘Ans. Define Modem. Modem takes it's name from the words Modulator-Demodulator which is actually a device, used for conversion of data signals. It enables a computer to transmit data over the network, Computer information is stored digitally whereas information is transmitted over telephone lines in the form ofanalog waves. 7. Writea shortnote on history of internet. 9. Whatisa Webserver? Ans. Internet was firstly developed in USA and used by | Ans: tis computer program that opens the web page the Department of Defense, This network was and response when a clientcomputerrequest to it known as ARPANET which was established in | 10. WhatisaWebsite? 1969. This was regarded to be the first step | ans, Web site is collection of Web-pages and it contains towards the creation of the Internet. Internet, text, images, videosand other multimedia elements, however, came to be used more widely in the 1990'sand ARPANET was shutdown in 1990's. In 1991, the first friendly interface of the Internet was developed at the University of Minnesota. Exercise-1 A. Choose the correctanswer. 1. The'www’ uses the protocol a) FTP Web 2. The ARPANETwasshut down in a) 1995 1992 3. Aweb-siteisacollection of a) Graphicfiles ©) Audio video files 4. The full form of WWWis. a) World white web ©) Worldwide web byHTTP dAllofthese b) 1994, d) 1990 b) HTML pages 4d) Allofthese b) World wholeweb 4d) None ofthese 5. A__isanetworkpointthatactsasan entrance for another network, a) Gateway ©) Cables b) Back-bone d) Internet10. IsPstandsfor a) Internal service provider ©) Internet setting program Some popularISPsin Indiaare a) Airtel Reliance Youcan subscribe foran internet connection toan__ a) Company isp URLisa ofaweb page a) Temporary Address ©) Permanent Address Internetexplorerisa a) Web browser )Search engine Shortanswer type questions. 1 2 3 4 How many types of web browsersare there? Whatisthe full form of ETF? Whatisuse ofa earch engine? Writetwo points about ARPANET, Whatisthe use of Websiteaddress? Define Internet. Whats Broadband connection? ‘Write any two points about HTTP? Describeawebsite, Longanswer types questions. 1 Explain working ofa web browser Explain working ofa web server. Whatarethe usesofinternet? Describe the e-mail services, How is WWW different from the Internet. Differentiate Dial up connection and Wireless connection. Differentiate Dial up connection and Broadband connection. b) Internet service provider 4) International service provider b) BSNL d) Allofthese b) Organization d)None ofthese b) Unique address 4) None ofthese b) Webserver d) None ofthese8 9, 10. Writeashortnote on history of Internet. Explain working of Protocol with example. Explain working of TCP/IP protocol. Exercise-2 Fillinthe blanks. WWWstandsfor, Google Chromeisa based browser. Asoftwareused to open web pages onthe Internetiscalleda__. Airtelisan example of ___ isresponsible for developingand promoting internet standards ARPANET was shutdown in___ providesa quick way of communication over the internet, ISP stands for ‘W3Cstandsfor State true or false. 1 10. Googleisa web browser Mozillaisasearch engine IETF stands for International Engineering Task Force, Dial-up connection provides speed up to 256 kb/s. Broad band connection provides speed up to 256 kb/s. Wire-less provides flexible internet connection without wire. ‘Web serverisless power-full than client computer, HTML stands for Hyper Text Makup Language. URL stands for Uniform resource locator. Aweb browserallows youto see calendar. Practical/Lab Activity 1 ‘The RBI is planning to expand its connectivity with all major banks of India, The plan includes providing TCP connectivity through HTTP for easy access points and seeking help from some ISP's to join hands in this venture, In addition, there is a plan to set up IIS and SMTP servers, Some banks will g0 for the ADSI, line while others will use leased line connectivity to access these services. The RBI is also talking help of IT professors in this venture. [CBSE sample paper 2011, TermII] Discuss the advantages and disadvantages of TCP and HTTP protocols as far as above mentioned news concerned.2. Aschool has two separate computer networks. One is used for keeping pupil and other staff records ‘The others for pupils to use in lessons to help with their learning and also to store their work, Peoples use the Internet quite frequently in their lessons to help them with their work, Discuss the advantage and disadvantage of this as far as peoples are concerned 3, Shyam is a business person who travels a Jot, He want an internet connection that will help him to keep in touch with his businessall the time. a) Suggest the type of internet connections thathe should use. b) _Listtwo ways ofaccessing the internetthrough a wireless connection. 4, Suppose you are studying in Xth class. Your teacher told you to gather information on the topic independence of India, List the entire networking device, which you used to gather the information aboutthe topic www.youtube.com/edusoftknowledgeverseINTERNET AND WEB SERVICES CHAPTER FOCUSES ON Y Retrieve Information from internet Y Blogs, Newsgroup, E-learning and E-commerce Y Application of E-mail and Search Engine Y Online shopping and reservation Y Chatting and video conferencing Y Social networking and Web 2.0 ‘Remote Login and SFTP and FTP Protocol Mobile Technologies and Web Services In this chapter, we are going to learn about information retrieval from internet, different web services available on internet (with their uses). Note: A web browser lets you view all the beautiful pictures, text, 3D images, videos and animations present inthe websites. Retrieving Information from INTERNET Itis the process of accessing information that is stored on the Internet. The process of exploring and retrieving the information from the Internet is known as net surfing. When your PCis connected to the Internet, you are ready to retrieve information fromit. You need a particular software called Web browserto retrieve information. When you type the URL of a particular Website in the address bar of the Web browser and press Enter Key, the browser retrieves the Web page from the Internetand storesits content, Awebsite address To retrieve information from the web-sites you need their unique address known as URL stands for Uniform Resource Locator. A URL is a formatted text string used by Web browsers, e-mail clients and other software to identify a network resource on the Internet. Network resources are files that can be plain Web pages, other text documents, graphics, or programs. URLsstrings consist ofthree parts (see figure 1): 1. NetworkProtocol 2. HostNameorAddress 3. FileorResource Location E-MAIL (ELECTRONICMAIL) E-mail or Electronicmailis a method to exchange messages in digital form. Itis one of the most important means of communication. These days e-mail operates across the country on either a small network or on a global network. ‘An e-mail message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, a composer's email address and one or more recipient addresses, Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.Getting Started with E-mail ‘The most widely used Internet-based communication tool is e-mail. The term e-mail refers to electronic mail. E- mail is a communication system that sends and receives messages through the Internet by using specific email addresses or e-mail IDs. There are so many mail servers available such as Yahoo, Gmail, Hotmail and Rediffmail. E- ‘mail helps in sending and receiving of messages. Through e-mail we can send any kind of information such as text messages, music files, video files, mages etc. It stores the mails in the inbox and allows the user to read them atany time. Note: An e-mail account is required to send or receive mails. Advantages of E-mail 1, E-mail speeds up the workflow process, documents can be sent for comments, corrections can be made quickly. E-mailing saves papersand printing costs, Multiple copies ofa message can be senttoa group of people. Messages can be prepared in advance and save until you are ready to send them. Fileand images can beattached to an E-mail. -mail offers many advantages over traditional mailingsystem. Some ofthe advantages are as follows: Anesmailis very fast.Itis received and delivered within the seconds from anywhere in the world. E-mailis very cheap mean of communication as compareto othersystem, Sending and receiving an e-mail is very easy and convenient, Many types of files such as text files, audio, videos and images can be sentas anattachmentthrough an e-mail. Disadvantages ofan E-mail 1. E-mailattachments can carry viruses. 2. Limited size of data file can be sent. 3. Hasty medium to convey emotions. 4. Noguarantee that the mail will be read until the user logs on and check E-mail. E-mail Address Ane-mailaddress defines the location of an individual's mailbox on the Internet, An e-mail address consists of two parts separated by '@' (atthe rate of) symbol Itispossible to send messages to anyone around the world ifyou know the person's e-mail address. A websitenameandane-mailaddress Awebsite name: Ihttp://wwwabe.com ‘An e-mailaddress:
[email protected]
Some popular e-mail service providers allow yout create a free e-mail account. © http://www.gmail.com © hitp://www.mail.yahoo.com © http://www.hotmail.com © http://www.rediffinail.com Keep one important thing in our mind that we are taking Gmail.com as e-mail service provider and all the options are based on Gmail's e-mail account interface.‘Tocreatean e-mail accountin Gmail.com, just follow the given steps- Open the Browser (eg. Internet Explorer), ‘Type www-gmail.com in theaddress bar ofthe browser, Click on'Create an Account! button given on the top-rightside ofthe Gmail.com home page. Fillthe form carefully according to the given instructions. Atlast, click on'l Accept. Create my account: button. Lookat the images given below (figure 2aand 2b). weene Google Google One account. All of Google. ‘Create your Google Account Senco oc essere e S e Pv ot - ees [Soa ‘togtree igure 2a Figure 2b E-mail Account Interface As soon as your e-mail account will be created you will see your e-mail account interface. You can also login into your e-mail account using your e-mail and password, To login you need to enter the username and password atthe home of www.gmail.com (figure 3). Google Sign in {0 continve to Gma Forgot emai? Figure 3After logging into your account, the e-mail account interface appears. This will looklikeas the image given below: rr Spores smear Ortega Dro Aetna Persone Figure # E-mail Account Components Anemail account consists of the following major components (figure 4), (a) Inbox- Thisisthe place whereall incoming mailsare being stored (0) Sent Mail- Thisis the place where ll sent mails are being stored. (©). Drafts-Thisis place where those mails are stored which we have composed but do not wish to send rightnow andkeep them for later use, ()_ ‘Trash-Thisisthe place where all deleted mailsare stored. (c) Chat-Thisisthe place whereall chatting messagesare being stored. (0 Spam- Thisisthe place where unauthorized mailsare stored. (g)_ All Mail- Itshowsall the mails of Gmail suchas Deleted, Incoming, Spam mails, etc. Sendan E-mail Ifyou want to senda mail to anyone, you justneed to follow the given steps: (a) Clickon’Compose Mail’ button, (b) Typethe e-mail address of receiver. (© Typethesubjectname. (d)_Typethemessage and click on’Send’ button (figure). ‘The e-mail will be sentto the mailingaddress within seconds. Additionally, Gmail.com provides tools to format you e-mail message. For that, it has fonts, color, size, links, bullets, etc. that weare generally use in WordPad or MS Word for creating or designing the documents, Figure 5Structure ofan E-mail Components Description To This field contains the E-mail address of recipient. ce Ce stands for Carbon copy. This contains the address of recipients to whom. you want to send a copy of an E-mail message. Bec stands for Blind carbon copy. This field also contains the list of recipients. Bee Bec recipients can see the To and Cc addresses but Bec recipients name is not visible to others. Subject This field contains the title of a message. Body Itincludes text of an E-mail message. Attachments | You can attach any document with E-mail message. Formatting Using the formatting tab, you can edit the message. Other options _ Other options like emoticons, bold, italic, hyperlinks ete, are used to make message more interactive. Send button ‘You have to click the send button to send the mail. ‘Address of recipient W75 abo@gmaitcom x ce Address of Address of recipient recipient for | Bec for carbon copy blind carbon copy) Subject subject of message Text Area with regards, OGG&HKs Structure of an E-mailDifferentiate between CC and BCC Ce stands for carbon copy which means that whose address appears after the Cc: header would receive a copy of the message. Also, the Ccheader would also appear inside the header of the received message. Bec stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Ce fields will not know thata copy sentto theseaddress Forward and Reply an Incoming Mail Forward mail option is used to send a copy of the received mail to others. For this, you just need to do the following © Thu Jun 4, 12:34PM (6 daysa0) xx | || F steps- é 1. Openthemail from Inbox. Reply 2. Clickon'Forward' linkbutton. Reply toall 3. Typethee-mail addresses to whom you wantto send Sona the mail, (You don’tneed to type message this time.) = 4, Clickon’Send’ button, Figure 6 Note: You can send email to multiple person by separating the email addresses using comma (). Reply mail option is used to reply the answer /opinion suggestion, etc. tothe person who has sentyou the mail. For this, you just need to do the following steps - 1. Openthe mail rom ‘Inbox. 2. Clickonthe’Reply' button 3. Typethemessage. (You don'tneed to type email address this time). 4. Clickon’Send’ button. ‘The message will be sent to the same person, from whom you have received the mail along with the copy ofsame mail Createa DraftofMail From David Singh
+ sof od Sometimes, we are creating an e-mail to send someone but suddenly decide not to send it and wish to save this mail and send it later, For this purpose the Draft is used. Its also used if you are typing an e-mail and unfortunately you lose the connection at that time the mail will automatically be saved into the Draft. Davie ‘9205322188 7011962642 E-mails are automatically saved after few seconds. If you neither want to send nor save then click on Discard button, the mail will be discarded (figure 7). ~ sosseif - 7? BTU EE 4 te oene Figure 7Delete Mails Weccan delete the mails very easily. To delete the mail, follow the given steps- 1. Selectthe mail(s) in Inbox’, which you wantto delete. EEE 2. Clickon'Delete' button Figure 8 Note: Deleted mails can be regained into Inbox. You just need to click on trash and select the mail from there. Now click on’Move' to button and then click on ‘Inbox’, The mail will be moved to Inbox’ again. Differentiate between Spamand Junk mails Spam emails are unsolicited messages sent to tens of thousands of people, usually via mailing lists which are bought and sold online, It can also be malware, viruses, phishing links or other malicious content which is usually sent via unsecured email servers, or compromised Pc’. Junk emails are genuine messages for marketing, promotional, sales purposes etc, which end-users may have signed up for, butno longer wish to receive, or believe they did not sign up for. Add/Manage E-mail Contacts E-mail server (For example, www.gmail.com) manages the address book automatically. It saves all e-mail addresses to which you have ever sent the mail atleast once, But if you want to add the details of person, you can do so,’To manage the detailed address book follow the given steps- Clickon Gmaillistbox and select Contacts’ option (figure 9a). Anew frame appears. Selectthe'Create Contact’ button, text box appears [figureb(i)]. Clickon’Createa Contact’ button, a text box appears below thebutton [figure 9b(ii). Enter the name of the person. Clickon Add’ button. The entered name appears inthe contactlist. Clickon the new contact name to enter other fields. form appears to enter the other fields [figure 9b(tii)]. Enter the required fieldsand go backto contact istby clicking on back’ button. = e Contacts =f Create contact @2mM e News Gmail Contacts Figure 9a = @ contacts Create a contact Figure 9b(I) 2 24 Create multiple contacts Figure 9b(ii) Figure 9b(ii)Toviewall the contactsatonce- © Clickon Gmaillistboxand select ‘Contacts’ option (Figure 10a). Anew frame appears. Ooms a= ae qk ee va sie ribs ene : wegen B semenene ene Figure 10a() ‘To exportthe (selected) contacts - ~' _ amar rng conte © Click on Gmail’ list box and select ‘Contacts’ option. [figure 10a(i)].Anew frame appears. © © Select the required contacts and click on ‘More’ button |» sow: [Figure 10a(ii)]. Select the Export’ option, Bl wergeene © The’ExportContacts’ dialogbox appears. @ — Selectthe required fields and click on’ Export’ button (figure. | * _'"P°* 10b). ot] Figure 10a(ii) On line web applications keep changing rapidly. In recent versions of Gmail ‘web application, the Contact option is found in Google Apps drop-down menu. Thismenuislocated on intop-rightcorner(_). Export contacts © © Seeced ana) To exportall contacts - © catacts © Click on ‘Gmail’ list box and select ‘Contacts’ option. A new frame | fonts appears. @ coogecsy © ontck cov © Clickon'export’ option, © — The'ExportContacts' dialogbox appears. ‘Oi pelenmeag © Selectthe Allcontacts’ option and the export format. cot pt © AtlastClickon’Export button Figure too CHATTING ON INTERNET Chatting is a way through which we can make text/audio/video conversation with anyone instantly. Type your message and he will reply. This way is also known as Instant Messaging, Even there is no charge for it. Nowa days, technology has grown up at the stage like where we can talk with anyone on internet. Talking with anyone on internetis called voice chatting, Apart from voice chatting, if we have Head Phone, Microphone and Web Camera like devices with good internet connection, then we can chat with anyone by face to face. This is called the video chatting, ‘Themostcommon types ofchatare: (1) Internet Relay Chatting (IRC): This is most common chat medium. IRC has become very popular as more people get connected to the Internet because it enables people connected anywhere on the Internettto join in live discussions. IRC is not limited to just two participants. Itis an application layer protocol that facilitates transfer of messages in the form of text. The chat process works on a client/server model of networking.(2) Web Chatting: A web chat is a system that allows users to communicate in real time (using easily accessible web interfaces), Itisa type of internet online chat distinguished by its simplicity and accessibility to users who donot wish to take thetime to install andlearn to use specialized chat software. (3) Instant Messenger Chatting: Itis a type of online chat which offers real-time text transmission over the Internet. These are special application programs which need to be downloaded separately. These are also known as Messenger Services Applications, These are used by the registered users. Ithasall the chat facilities and commands. We just need to open the messenger and start using it. Some of the most popularly used messengers are Yahoo Messenger, GTalk, Redisf{Bol, MSN Messenger, Skype, etc. Chatting From E-mail Inbox (Instant Relay Chatting) These days, most of the popular e-mail service providers are offering Instant Relay Chatting from e-mail inbox. Users do not need to install any other application to chat with anyone. But these chatting services have some limited means of chatting options. Steps to chat with someone using gmail.com (instant messenger) are given below: 1. ‘Sign In’ toyourGmailaccount. 2. Search the person online from left side of the taskbar (Green or Red or Yellow bullet symbols show that personisonline). Clickonthename ofthe person. A chatbox willappear. Nowstart chatting, Note: We can chat only when both the user are using the same service provider's email and chat service. Ifyou want to use some other email account and then chat with someone, you have to use websites like Facebook, ‘Skype, etc. These Websites facilitates its user to chat with anyone buthe/she must bea Facebook user.VOICE CHATTING We can chat with our friends not only with textand typing but with sounds as well. Thisis called voice chatting, Using this facility, we can talk with someone just similar to talking on phone or mobile, Itis free of charge for unlimited time. For this facility, we need to have a good internet connection, a multimedia computer with Head- Phone with Microphone. Voice chat is a modern form of communication used on the Internet, The means of communicating with voice chat is through any of the messengers, mainly Skype, Yahoo! Messenger, GTalk, Facebook, AOL Instant Messenger, in Speak Communicator or Windows Live Messenger etc, Voice chat has led to a significant increase in distant ‘communications where two or more people from opposite ends ofthe world can talk almost free of cost. VIDEO CHATTING OR VIDEO CONFERENCING Video Chatting is also known as face to face chatting, It is technique using which we can talk with someone face to face, For making video calls we should have a good integrated camera as well as high speed internet connection for uninterrupted video chatting, Video conferencing is conducted with the help of telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously (figure 12). It has also been called ‘visual collaboration’ and isa type of groupware. Note: Video chattingiis used personally but Video conferencingis used professionally, Itmeans video chatting is done from home or café but Video conferencing is done by employers from offices for their business purposes, Web camera is required forboth video chattingand conferencing, Components of Video Conferencing Video conferencing can conveniently be broken down nto three components: © The Conference Environment, thatis the classroom, conference room or any other suitable environment to do video conference © The Conference Equipment, that converts the images and speech of the participants into a format that enables transmission toa remote site over the network. © TheConference Networkthat links the sites together, ‘Typesof Video Conferencing Video-enabled meetings happen in two distinct ways: 1. _ Point-to-Point Video conferencing: In point-to-point, the simplest scenario is whereone person or group is connected to another. The physical components (i.e, microphone and camera) that enable the meetingto take place are often integrated into desktop computing solutions, like a laptop or tablet, or can be combined into dedicated, room-based hardware solutions. Where desktop solutions tend to be used by individuals, room-based solutions utilise dedicated VC technology where groups of people can be seen, heard and can naturally participate in the meeting. 2. Multipoint Video conferencing: In multipoint video conferencing, three or morelocations are connected together, where all participants can see and hear each other, as well as see any content being shared during the meeting,Advantages of Video Conferencing Some advantages of video conferencingare: @ _ Fastand Convenient for Meetings: As the video conference can be held during working hours, people need not to travel to get to the location of the conference, This makes Internet video conferencing a fast and convenient way to hold meetings. © Saves Money: The initial video conferencing costiis fairly high but ultimately costs are reduced as people will not have to travel or fly to the other side of the world to attend the meetings © Saves Time: Just walking into another room in your office building takes less time than travelling to another location to attend a meeting, As every person necessary to make decisions can join the video conference, this, isthe ultimate way to speed up corporate decisions. © Useful Real-time Technology: It is a useful technology for real-time telemedicine and telenursing applications, Ithelps the doctors in discussing cases and providing diagnosis to patients across the globe, Disadvantages of Video Conferencing Some disadvantages of video conferencingare: © Setup can be Relatively Expensive: The initial setup costs for video conferencing technology can be quite costly, depending upon how big a group of people should beable to converse via this technology. @ The Lack of Familiarity with Technology Used can be Disconcerting: People who need to use video conferencing should be trained to handle the equipment. Someone has to maintain the system and needs to know whathas to be done in case of failure or other problems that mightarise. © The Problem of Time Zones: People in different countries or even in different parts of the country live in different time zones. This can make it complicated to set up video conference meetings. © Extra Space Needed: As the devices and the screen have to be setup ina permanentenvironment to keep the connection stable and to keep the entire setup running, itis best to set aside a special room within the office building for video conferencing. This will take up office space that could otherwise be used for personnel or normal meetings. SKYPE (TEXT CHAT, VOICE CHAT, VIDEO CHAT AND MORE) Skype is a software application that allows users to make voice and video calls and chat over the Internet, Calls to other users within the Skype service are free, while calls to both traditional land line telephones and mobile phones can be made for a fee using a debit-based user account system. Skype has also become popular for its additional features which include instant messaging, file transfer, and video conferencing, Join the millions talking on Skype Figure 13 Note: Skype is a platform independent language. It can be installed on any operating system, We can create e- ‘mail account from any e-mail service provider website and use that accounton Skype.StepstouseSkypeare, Download Skype application from Skype.com. Install Skype application, Createa Skype account using any email account, Add friends by asking their mail IDs, Now, youcan start Text Messaging/Voice Calls/Video Calls/File Transfer. oeeNe Ou. cee Your conversation is all set up eae go Figure 14 Locating Sites using Search Engine Asearch engines a computer program that searches for information on the web. Itis provides the required data on specific topics. tturn the Web into a powerful tool for finding information on any topic, Search engine allows users to enter keywords (queries or terms) related to particular topics and retrieve information about the Websites containing these keywords, Itis a program designed to search for information on the Web through a database of ‘Web pages queries or keywords. When search query is submitted in the search engine by user, the software used for search algorithm scans the index to find Web pages over the Internet. ‘The most popular search engine is Google. Some other search engines are Yahoo Search and Bing, The various search engines available today are: Google: Itwas originally called BackRub. Itis the most popular search engine globally. Bing: It was launched in 2009 by Microsoft, It is the latest web-based search engine that also delivers Yahoo's results, ‘Ask twas launched in 1996 and was originally known as AskJeeves. Itincludes support for match, dictionary, and conversation question, AltaVista: It was launched by Digital Equipment Corporation in 1995. Since 2003, it is powered by Yahoo technology.AOL Search: tis powered by Google LYCOS: Itis top 5 internet portal and 13"largest online property according to Media Matrix. Alexa: Itis subsidiary of Amazon and used for providing website trafficinformation, Working of Search Engine Web Crawler It is a software that browse the Internet in a systematic manner, It retrieves the information, which follows every link on the site that are stored by Web search engines. It is also known as spider, ant, automatic indexer or Web scutter, Indexing Software Itis a software that receives the list of Web documents and addresses collected by Web crawler, Some search engines provide proximity search which allows users to define the distance keywords. Search Algorithm Itis a concept based searching, where the research involves using statistical analysis on pages containing the words or phrases you are searching for. Tolocatea website on the internet, follow the given steps: Step 1: Openthe Google home page. Step 2: Type the website address on the address bar. OR Google ——Microsort Qa News Elimages Shopping Maps i More Settings Aboui 2.37,00,00,000 results (0.62 seconds) \ww.microsoft.com > enn + Microsoft - Official Home Page ‘At Microsoft our mission and values are to help people and businesses throughout the we realize their full potential Microsoft account Store ‘Sign In with your Microsoft Explore Microsoft Store and shop ‘account. One account. One place ‘online for Surface laptops and to Download Center Microsoft Support * Figure 15: Search the data and click on the corresponding website Step 3: Type the data to be search for and press the Enter key. A number of websites will appear. Click on the name ofthe website to open its home page,Finding People On Internet ‘There are various using which you can search for people on the internet. n India, Indian People Directory(IPD) isa database that contains public information that can be used to find friends and family with whom you've lost touch. ‘Youcan search for people using names and locations or phone numbers. You can also search using email addresses. Step 1: Open Google home page. Step 2: Type theaddress www. indianpeopledirectory.com and press Enter key. The interface of IPD appears. INDIAN PESPLE Pron wnatsape Support FAQ. Buy Packages 7 Any ites Figure 16: Interface of Indian People Directory Step 3: Thereare three categoriestosearchnamely © SearchbyName © Searchby MobileNo © Searchby Emailld BR © etre erence cera recencorone tp CARON INDIAN Pree DIRECTORY Soh _woesMS WOGnYaiRp Suen 80 muy Penge Sencha rary Deepak une serch Depak Gupta Figure 17: Interface of Indian People DirectoryStep 4:Enter the desired criteria and clickon the GO button, Some other websites that provide the facility of inding people on the Internetare as follows: 1, __hitp://wwwfacebook.com/ 2, http://pipl.com/ 3. __http://www.ndiabook.com/people/ 4, http://wwwlinkeclin.com/ 5. hitp://wwwanywho.com/ ‘Tip: Piplis the world's largest people search engine. File Transfer Protocol (FTP) File Transfer Protocol, or FTP, is a protocol used for transferring files from one computer to another - typically from your computer to a web server, FTP is the preferred method of exchanging files because itis, faster than other protocols like HTTP or POP. The data transfer is asynchronous. The File Transfer Protocol (ETP) was first submitted as a Request For Comments (RFC)in1971. fp://abc.com Figure 18 hitp://abe.com FTPServer FTP Client FTP Server-isacomputer thatis running FTP server software. An FTP server listens the request on network for connection from other FTP clients and process the request and return the resultto client. 2. PTP Client A FTP client program enables the user to interact with a FTP server program in order to access information and services on the server computer. To access FTP server program, users must be able to connect to the Internetor interact with FTP client program, Objectives of FTP are: 1. Topromote sharing offiles (computer programs and/or data), eat, SS Replies — [= ent on Client PC FIP Server 2, Toencourage indirect or implicit (via programs) use of remote computers, 3, Toshielda user from variations in file storage systems amonghosts. 4, Totransfer data reliably andefficiently. ‘Some popular FTP softwareare:- Name License Platform AFT Proprietary Windows only Cerberus FTP Server Proprietary, Commercial Windows only ‘Complete FIP Server Proprietary Commercial Windows only ‘Mac 05%, Windows, Linux, (CrushTP Server Proprietary, Shareware “BSD, Solaris,ete ‘Windows XF/Vista/7/Server 2003/ leita Server ‘Open Source Free Software Blea Se ms 2, 2008/82DOWNLOADING AND UPLOADING THE FILES FROM REMOTE SITE Downloading is the transmission of a file from server or remote computer system to user’s computer. From the Internet-user’s point-of-view, downloading a file means request for a file from server computer and to receive it. Downloadingimages, articles and applications from the Internethas becomea snap with text (like Download, Click Here etc.) links on Web pages. ‘The only thing is that, users must know how to find the downloaded files in the computer If the downloaded file is an application, it must be installed, which can be an automatic operation or require the user to take one more step forrunning the installed program. Uploading is the transmission of a file from local system to a server or remote computer From an Internet-user’s point-of-view, uploading is sending a file to a computer that is set-up to receive it. The most common type of uploading is when a user uploadsa digital image to an Internetsite, The uploaded files are stored on the Website's servers and can be seen by anyone who has the Internet connection anditis necessary to.use the right software for viewing. UPLOADING AND DOWNLOADING FILES FROM FTP SERVER Upload Single File to FTP Server To upload file on FTP server use put command from FTP prompt: First, navigate to the desired directory on FTP server where to upload a file and use the following command. It will upload local system file c:\:files\filel.txt to uploads directory on FTP server. cduploads putc:\files\filel txt Downloada Single File from FTP ‘To download the file from FTP server, you use get command, Using this command, you can download one file ata time. To download any file from FTP server first login to your FTP server, navigate to the directory and use the following command to download. get filel txt, Upload Multiple Filesto FTP To upload multiple files to FTP server you use mput command from FTP prompt, We can specify wildcard character to upload multiple files to the server at a time, First, navigate to the desired directory on FTP server where to upload file and use the following command. It will upload local system files with txt extension in c-files directory to uploads directory on FTP server. cduploads lede:\\files mput*.txt Download Multiple Files from FTP ‘To download multiple files from FTP server, you use mget command, Using that command, you can download more than one files ata time, To download multiple files, specify wildcard character for specifying directory name do download all files from the directory. mget*.txt TCP/IP ‘TCP/IP protocol are a set of rules that are needed for the working of the Internet. When data is transferred from one computer to another over the Internet, it is broken into pieces using Transmission Control Protocol (CP). ‘These pieces are called packets that are numbered serially. Internet Protocol adds the IP address (a unique address) of the sender computer (node) and the recipient computer (node) to each packet so that itreaches thecorrectrecipient. ‘The recipient computer receives packets in random manner (It may even receive 10 before 1 arrives). Ifa packetis garbled or lost, itis demanded again. The packets are reassembled in the order they sent and the original message isobtained. STEP 2 ‘STEP 1 STEP3 — The packets travel trom are eee rote to router over the TheTCP protect -r | into packets. Internet according to the reassembles the | | IP protocol Petals ee | ron | Crouter ) ‘Coane original ie. } 5c an 2 SS Figure 19: Working of TCP/IP HTTP HTTP stands for Hyper Text Transfer Protocol. Itisa protocol that defines a set of rules for exchanging information ona network, HTTP is a high-level protocol used to exchange information between a browser and a server. The HTTP protocol uses TCP/IP to locate and make a connection between the browser and the server. The messages sentbetween the browserand server are either request or response messages. ‘The request message contains © Arequestline containingthe name of the requested file and whether the request isa GET or POST. © Aheader containing information such as the type of browser and operating system. © Abodycontainingdata, for example, data entered into a orm. Theresponse from the server will contain © Aresponse line witha code indicatingthat the requested file was found oran error code (almosteveryone has had to deal with the dreaded HTTP 404 Error -filenot found) ifthere wasa problem, © Headerinformation suchas the type of server software. Abody containing the HTML of the requested file, An HTTP requestand responseisillustrated in Figure20. HTTP Clients (Web Browser) HUE na TCRAP: HTTP Server (Web Server) Figure 20: Http Request and ResponseGET and POST: GET and POST: In the request line sent from the browser to the server is an HTTP command called the method. The method is usually a GET ora POST. The GET method isa request fora specific URL. With GET request, the body is empty, The POST method tells the server that data will be sent in the body of the request. The POST method is used when you submit forms. HTTPS HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL (Secure Socket Layer). Itis efficient in cases where authenticity is required like the browser need to fill out forms, sign in, authenticate and carry out bank transactions. SSH PROTOCOL Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (optionally) to allow the remote computer to authenticate the user SSH provides confidentiality and integrity of data exchanged between the two computers using encryption and message authentication codes (MACs). SSH is typically used to log into a remote machine and execute commands. The SSH server, by default, listens on the standard TCP port 22. Typical uses of the SSH Protocol ‘The protocol is used in corporate networks for: ‘The SSH protocol isa method for secure remote login from one computerto another. Itprovides secure access for users and automated processes, Itfacilitates interactive and automated file transfers. Ithelpsissuingremote commands, Itmanages network infrastructure and other mission-critical system components. Secure File Transfer Protocol (SSH File Transfer Protocol) Secure File Transfer Protocol (SFTP) isa network protocol. Itis used for accessing, transferring and managing files onremote systems. SFTP allows businesses to securely transfer billing data, funds and data recovery files. SFTP uses SSH to transfer files and requires that the client be authenticated by the server. SFTP was developed by the Internet Engineering Task Force (IETF) to securely transfer and manage files overa TCP/IP network. SFTP is part of the SSH Protocol. This term is also known as SSH File ‘Transfer Protocol. SFTP can work with many protocols butis most commonly used with SSH to provide secure authentication, SFTP uses the same commandsas the standard file transfer protocol (FTP) Using SCP (Secure Copy) ‘The SCP command can be used to send a file to a server or retrieve a file from a server, Because it uses the SSH protocol for authentication SCP is more secure than FTP which transmits passwords in plain text. Itprovides file transfers between hosts on a network. With SCP. you can quickly transfer files between hosts along, with basicfile attributes such as access permission and timestamps that are not always available via FTP. SIMPLE MAIL TRANSFER PROTOCOL (SMTP) This protocol is used for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another: The messages can then be retrieved withan e-mail client using either POP or IMAP.Differentiate between POP and IMAP SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication guidelines that allow software to transmitan electronic mail over the internets called Simple Mail Transfer Protocol. Itisa programused for sending messages to other computer users based on e-mailaddresses. Itprovidesa mail exchange between users on the same or different computers, and italso supports: Itcan senda single message to one or more recipients. Sending message can include text, voice, video or graphics. Itcanalso send the messages on networks outside the internet. ‘The main purpose of SMTP is used to set up communication rules between servers. The servers have a way of identifying themselves and announcing what kind of communication they are trying to perform. They also have a way of handling the errors such as incorrect email address, For example, if the recipient address is wrong, then receiving server reply with an error message of some kind Remote Login Telnet - Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines. It follows a user command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol for creating remote sessions. Telnet can be used for a variety ofactivities on a server, including editing files, running various programs and checking email. Telnetis nota secure protocol and isunencrypted. Working of TELNET 1. Using telnetclientsoftware onyour computer, your computer makesaconnectiontotelnetserver(remote host). 2, Once your telnet client establishes a connection to remote host, your client becomes a virtual terminal, allowing you to communicate with remote host(telnet server) 3. Nowyoucan type telnet based commands on client computerand telnetserver acts accordingly. Advantages of Telnet protocol are, © Accessing Remote Computers: One of the biggest advantages of Telnet software is that it allows remote access to someone else's computer. @ Saves Time: Instead of physically traveling to another person's home, you can perform any task on his or her computeralmostimmediately. © Easy to Use: Youalsoneed to know the Internet protocol (IP) address ofthe computer you want to access and havea reliable Internet connection. © Universal: Among Telnet's more attractive features isthe fact thatyou can use ton any computer. SSE Some modern systems enable only command-line connections using Secure Shell (SSH), an encrypted tool similar to Telnet, Because of security concerns, many professional organizations require use of SSH instead of Telnet. SSH is the most commonly used alternative, largely because it encrypts all the traffic that passes over the communication channel. SCP -SecureCoPy ‘There are protocols that allow to copy files between two servers or two connected machines over internet. SCP is Secure Shell Protocolfone such protocol allows you to transmit files from one computer to another machine over internet with encryption benefits of SSH. Most SSH clients include SCP capability. It offers own set of command options for secure copying of iles across two connected machines over internet, SFTP(Secure File Transfer Protocol Itisasecure protocol for client transfer and it ensures security of data based on SSH protocol. SFTP ensures data safety by taking these measures: 1. SFTP requires that the client user must be authenticated by the server and the data transfer must take place overasecurechannel.(SSH) All data is encrypted before being sentacross the network SFTP encrypts both commands and data providing effective protection against common network security risks WEBSERVICES Chat -Itis the online textual or multimedia conversation, It is a real-time communication between two users via computer. Itis widely interactive text-based communication process that takes place over the Internet. Chatting is a virtual means of communication that involves the sending and receiving of messages, share audios and videos between users located in any part of the world. In chatting, you type a message in your chat box, which is immediately received by the recipient, then the recipient typesa message in response to your message, which is instantly received by you. Common Types of Chat— 1. Instant Messaging (IM) 2, “Iseek You" (ICQ) 3, IRC (Internet Relay Chat) 4, Web Chats Video Conferencing - It is a communication technology that integrates videos and audios to connect users anywhere in the world, as if they are in the same room, This term usually refers two way communication between two or more users who are in at least two different locations, rather than one-to-one communication and it often includes multiple people at each location, Each user or group of users who are participating in a video conference typically musthave a computer,acamera,a microphone, a video screen anda sound system. Areas of Application - 1. Business 2. Distance Learning 3. Telecommunication and clients 4. Legal Environment 5. Telemedicine 6 Media Advantages of Video Conferencing 1. It reduces your travel costs by working remotely and also increases productivity through collaborative working Many people can share their videos with each otherat the same time. PowerPointand other visual displays can be shared with everyone attending the conference at the same time. Virtual whiteboard allows people from different locations to add their own thoughts or ideas into one collaborative space. With more advanced services, a document can be changed and typed directly from other computers connectedtothe conference. Disadvantages of Video Conferencing 1. In the middle of an important meeting, you may be disconnected at any time and have to wait to be reconnected, 2, Thereisno substitute fora face-to-face meetingin getting to know someone, 3. Foralongtime, video conferencing equipment have been expensive and out of the reach of smaller businesses, 4. Sendersand receivers mustbe onlineatthe sametime. E-Learning Itrefers toan electronicmode of delivering learning, training or educational programs to users. E-learning is the mode of acquiring knowledge by means of Internet and computer based training programs, E- learning can be done anywhere and at anytime. Broadly, E-learning is synonymous with Computer Based Instruction (CBI), Computer Based Training (CBT), Internet Based Training (IBT), Web Based” Training (WBT) and online education. E-learning applications and processes include Web based learning, computer based learning, virtual classrooms and digital collaboration. Advantages ofan E-Learning 1, Class work can be scheduled around office and family, Reduces travel time and travel costs for off-campus students. 2, 3. Self-paced learning modules allow students to work at their own pace. 4. Learning can accommodate, differentlearning styles and facilitate learning through avariety of activities. 5. Develops knowledge of an Internet and computers skills that will help learners throughout their lives and careers. 6, Successfully completed online or computer based courses build self-knowledge and self-confidence and encourages students to take responsibility for their learning. Disadvantages ofan E-Learning 1, Without the routine structures of a traditional class, students may get lost or confused about course activities and deadlines. 2, Students may feelisolated from an instructorand classmates. 3, Instructor may notalways be available when students are studying or need help 4, Slow Internetconnections or older computers may make accessing course materials frustrating 5, Hands-on orlab workis difficult to simulateina virtual classroom, -Bankking- Itis defined as the automated delivery of new and traditional banking products and services directly to the customers through an electronic and interactive communication channels. E-banking is also known as Internet Banking, Online Banking or PC Banking, E-banking can be broadly classified into the two categories, which are as follows: % Transactional- Itinvolves performing financial transactions. Transactional activities areas follows: i. Electronicfund transfer. il, Billpayments, iii, Loan applicationand repayments. iv, Buyinginvestment products.+ Non-Transactona- Itinvolves viewing bankstatements Non transactional activites areas follows L_Accountbalance viewing iL. Bankstatement downloading Be Megane t . ii, Cheque bookordering on nrg iv. Provision ofaccount/bankstatement. et epee J ta Advantages ofan E-Banking emt 1, Thereareno geographical barriers and the services that can be offered ata minimum cost. 2. Through Internetbanking, you can check your transactions atany timeandasmany timesasyou wantto 3. Ifthe fund transfer has to be made outstation, where the bank does not have a branch, the bank would demand outstation charges, whereas with the help of online banking, it will be absolutely free for you, 4, Internet banking deploys the Internet as a medium for financial transaction. e.g. a customer login to his or her bank accountby accessing the bank Website. Disadvantages ofan E-Banking 1. Understanding the usage of Internet banking might be difficult fora beginneratthe firs 2. Youcan nothaveaccess to Internetbanking, ifyou don'thavean Internet connection. 3. Security of transactions is a big issue. Your account information might get hacked by unauthorized people over the Internet. E-Shopping- E-shopping or Online Shoppingiis the process of buying goods and services from merchants who sell their products on Internet. Consumers buy a variety of items from online stores. In fact, people can purchase just about anything from companies that provide their products online, Books, clothing, household appliances, toys, hardware, software and health insurance are just some of the hundreds of products, consumers can buy from an online store. ‘The main components of E-shoppingareas follows: + Product: + Accessibility to people. + Mode ofpayment. + Sellingplace. + Delivery mechanism + Placementoforders. SomeE-shopping sites are Naaptol, Flipkart, Yebhi, HomeShopI8, Amazon.com, Advantages of E-Shopping Findinga productonlineismuch more easier than looking for itin the local store. Now-a-days online shoppingis very reliable. Most ofthe stores provide money back guarantee, You have infinite options to choose product. 5. Ifyoudonot findany product within your country then you can shop online froman international store. Disadvantages of E-Shopping 1. The customer might be worried as to the similarity of the product being ordered and the product being received.2. Youhave to wait for delivery. 3. Youmaybea victim of online fraud 4. Youmayhaveto pay for shipping, while returning, 5. Youcannotreally see/feel the items, you purchase. B-Reservation -It means makinga reservation fora service via Internet. You need not personally go to an office or a counter to book/reserve railways, airways tickets, hotel rooms, tourist packages etc. Examples of E-reservation sitesareas follows: 1. wwwiretecom 2. makemytrip.com 3. yatra.com 4, bookingsite.com Benefits of E-Reservation 1. Safety 2, Base 3, Available Anywhere 4, Fast Advantages ofan E-Reservation 1. Real-time process. 2, Canaccess more information and find other details online about your reservation, 3. Websites can compare different flight prices and details, Disadvantages of an E-Reservation 1. Need high speed Internet connection and PC experience. 2. Mightneed a credit card orsome other form of payment. 3. Viruses/Trojans may steal your information, 4. Ifthe Website isnot working properly then, due to some server issue, reservation can'tbe done. £-Groups- An E-group or online clubbing is a group of persons or individuals who come together over the Internet fora specific or common purpose using the best Internet communication tools to share ideas, different opinions, experiences and to learn from each other. E-groups are Internet based discussion groups. A message posted in discussion is known as post. Allthe postsare visible to all the group members Advantages ofan E-Groups 1. Ithelpsto create and maintain social relationship. It facilitates communication among members. Itfacilitates research as members assistone another. Itfacilitateslearning, Less timeand costis used, Itkeepsmembers abreast with new developmentand knowledge. Disadvantages ofan E-Groups 1. Thereisno privacy, fintimate issues are discussed.2. Every wrong information has anegative impact on each other. 3. Itishard to follow the logical sequence of discussion. Social Networlking - Its the grouping of individuals into specific groups, like small rural communities or a neighborhood sub-division. This service is an online service, platform or site that focuses on facilitating the building of social networks or social relations among people, e.g. who share interests, activities, backgrounds or real life connections. When it comes to online networking, social networking Websites are commonly used. ‘These Websites are known as social networking sites. Finding People on the Net ‘There are numerous sites on an Internet and search engines that can be used to help for finding people on Internet, + Search on social networking sites such as Facebook, MySpace, BlackPlanet etc. for the person. + Perform an online search for the person by name, Sites such as Bing, Yahoo search ete, + Search online directories such as WhitePages, SuperPages for the person. The directories sometimes include directory information for a person, who is not listed in your local phone book. Advantages of Social Networking 1. Social networking sites help us to find our long-lost and childhood friends and relatives. 2, No software or setting changes necessary to PC/phone. 3, Itis an easy and cost effective way to reach your consumers and people in your network, 4 For business purposes, connecting with your customers on a personal and professional level will make them loyal to your company and brand, 5, Ithelps in building credibility amongst the customers, Disadvantages of Social Networking. 1. Lack of anonymity, 2, Social networking usually requires you to input your name, location, age, gender and many other types of personal information ‘Scams and harassment. Being online you are at risk of facing cases of cyber stalking and theft identity ‘Time consuming, Ifyou are new to social networking, learning process can be time consuming. 3 4, 5, 6 ‘overnance ~ E-governance refers to the application of electronic means in governance with an aim of fulfilling the requirements of common man at affordable costs and in fastest possible time. E-governance can be thought as the application of electronic means in governance - 1. The interaction between government and citizens and government and businesses via electronic means. 2, Use of electronic means in internal government operations to simplify and improve democratic, government and business aspects of governance. Most common e-governance projects in India 1. wwwineagovin 2. https://www>passportgov.in 3. https://www.ncometaxindia.gov.in 4, https://wwwindiagovin https://www.nygovinAdvantages of e-governance 1. Transparency -Bribeand corruptionare the main concernin India and they are consideredastheb ig ge st hurdle for the development of society. E-Governance has brought transparency in the government system and, itcreated an unfavorable situation for corruption, ICT enables the citizen to seeany information wherever they want. Now the common man can raise a finger on the government policies as now he can lodge the complaints one-portals of government, Speed - E-Governance provides the required information to the common or special person in no time. Cost Reduction - The paper-based communication is much costlier than ICT, E-governance saves the cost of sending and receivinglettersin orderto get some information. 4. Expand Reach of Governance - E-governance has brought the government policies at the doorstep of common men, Now any Indian citizen can get access on the government policies and schemes. They can read them andask queries online through their smartphones. Disadvantages of e-governance 1. Dependency - Our dependency on technology is fine until the technology is supporting us but once it stops working all the work stops. This dependency eats lots of time. For example in banks a very common phrase we listen tois. The server isnot workingso most of the work stops. 2, Literacy - To reach to the every Indian is the vision of government behind E-governance but in India, the literacy rate is not so high. The implementation of e-government will be more effective with a high literacy rate. 3. Availability of Computers - A computeris a common device butits not available at every home in India. Inthe absence of a computer, the facilities of E-Government can be enjoyed by accessing through Smartphone but itis also notavailable to every Indian, 4, Security - Security is a major concern for the government. The government has many E-governance projects and its government's duty to maintain its security. Recently there was much chaos on the security of Aadhaar Card, Challengesin e-governance Lack of literacy, non-availability of computer and other devices is the biggest challenge in the implementation of E- governance. Marinating the cyber security is another challenge for E-governance. Insufficiency of funds, infrastructural problems, maintenance, and legal framework readiness are among the other challenges in E- Governance The technology is getting advanced with every passing day so to maintain the level of technology the government needs to spend some funds after a particular duration. The arrangement of funds is another challenge in E- governanceas the cost of high-end technology servers is usually high INTRODUCTION TO BLOG Ablog can be a website or part of a website; itis just like an online dairy which is regularly updated for interaction with user: The activity of updating a blog is blogging and someone who is the owner of bogiis a Blogger. It contains idea of some- one related toa topic. A blog contains text, links, images, videos, etc. Blog have become very popular way to share their thoughts with others. Blog is an effective way to interact with others, Some common type of blogs is following: © Personal: This is the broadest category and includes blogs about personal topics like politics, music, family, ‘travel health, you nameit. © Business: Professionals ranging from realtors to lawyers and stock brokers are using business blogs to share their expertise, Companies have discovered the power of blogs to personally engage with their customers.© Schools: tisa great way for teachers and students to collaborate on classroom projects. © Non-profits: Foundations, charities, and human rights groups find blogs to be a great tool to raise awareness and money for their causes, Some features of a Blogare following: © Simple-to-use interface. @ Add photosand videos to your post. © Feedbackon your blog from the readers. Stepsto createanewblogon'Wordpress.com’are, 1. Decide onyour topic: Decideyour topic on which you want to write the blog like technology, politics, medical etc. 2. Createaname:'Thinkabout'whatis your blog's focus”, andthen thinkofsomenames that willletothersfindyou. 3, Finda blogging provider that suits to you: A couple of the most popular providers include Blogger and Word Press. Writein the address bar of your browser. For example, www:wordpress.com. 4. Enter your blog name: In the Blog Address field, enter the name you want to use. We'll try BaconCandy, and see how that works, 5, Ifyour firstchoice is unavailable and you don'tlike the suggested alternatives, try another name. 6. Selectyourtheme: Select theme which suit your topicand makea quality look for your Blog 7. Post something: Now that your blogis set up, write a few poststo test it out, and adjust the layout or style that yousee it. 8, Decide whether you want your blogtobe private or public. ROSS eer Cane Ce ceo, NEWSGROUPS ‘A newsgroup is an Internet-based discussion about a particular topic where any user can post messages any others can reads, reply to the message. Newsgroups are organized into subject, hierarchies, with the first few letters of the newsgroup name indicating the major subject, category and sub-categories represented by a sub-topicname. Newsgroups are effective way to share information with others on internet. Figure 23Example of some popular newsgroups:- © Altastrology © Alttennis © Complanguage.ct+ Stepsto access newsgroupson Yahoo.comare, 1, Writein the address bar of your browser http://groups yahoo.com. 2, Browseby category, or use the search box to find group that discusses topics that you are interested in, 3, Clickon thename ofthe group that youare interested in and you will be taken to the group's main page. 4, Ifyoudecide that you still want to join, after reading the full description, click on the “Join This Group!” button, located in the top, right corner. 5. Selectthe email address thatyou would like to use. 6. Finally, press "Join this group" button. MOBILE TECHNOLOGIES 1, SMS-SMS stands for Short Message Service and isalso commonly referred to asa “text message” With an SMS, you can senda message of up to 160 characters to another mobile device. Longer messages will automatically be splitup into several parts. 2. MMS (Multimedia Messaging Service) - MMS stands for Multimedia Messaging Service. It was built using, the same technology as SMS to allow SMS users to send multimedia content. I's most popularly used to send pictures, but can also be used to send audio, phone contacts, and video files. MMS messages do not have a standard limit. While their maximum size depends on the carrier and the device receiving the message, 300 KB isoften mentioned as the largest size most carriers will reliably handle, 3. 3G- 3G is the third generation of wireless technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming, 3G is mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net. 4. 4G~4Gis the next generation of mobile technologies with enhanced download and upload speeds and better connectivity, This allows user to do far more than check mail and basic web browsing, 4G allows for music streaming, fast and reliable web browsing and ability to use a device as portable entertainment center. + 4Gwasintroduced to provide a Wide Area Network for internetaccess, + Itprovided high bandwidth andbroadband. + According to the WWRI, 4Gisa combination of wired and wireless networks in computer. © A4Gnetworksare projected to provide speeds of 100 Mbps while moving and 1 Gbps while stationary. + Itis10 times faster than 3G, + The downside 4G is expenses in installing new cell towers, higher data prices for consumer and requirement of new device to use 46 service. Glossary Blog : _ Onlinejournal where users can share their ideas ona particular topic. Chat : Onlinetextual conversation. E-mail: Receivingand sending messages electronically. FTP: FileTransferProtocol.
You might also like
Syllabus Basic Computer Instructor
PDF
No ratings yet
Syllabus Basic Computer Instructor
2 pages
Computer Basics: Question Bank
PDF
No ratings yet
Computer Basics: Question Bank
72 pages
Difference Between MS Word and MS Excel
PDF
33% (3)
Difference Between MS Word and MS Excel
2 pages
CBSE Class 9 Computer Applications 2021-22
PDF
0% (1)
CBSE Class 9 Computer Applications 2021-22
4 pages
Computer Practical File (English Medium)
PDF
No ratings yet
Computer Practical File (English Medium)
35 pages
Classes 9 - 10 - Computer Club Activity
PDF
100% (1)
Classes 9 - 10 - Computer Club Activity
2 pages
IT 802 Computer Organization Class 11 MCQ
PDF
No ratings yet
IT 802 Computer Organization Class 11 MCQ
9 pages
Computer Networks PPT
PDF
No ratings yet
Computer Networks PPT
35 pages
Unit-3 Basic ICT Skills
PDF
No ratings yet
Unit-3 Basic ICT Skills
9 pages
Class 11 - I Terminal Exam Final Paper-Answer Key
PDF
No ratings yet
Class 11 - I Terminal Exam Final Paper-Answer Key
7 pages
Class 9 Rbse Computer English
PDF
No ratings yet
Class 9 Rbse Computer English
219 pages
402-X-2022-23-Sample QP-1
PDF
No ratings yet
402-X-2022-23-Sample QP-1
9 pages
Satish Chandra Memorial School: Case Study Based Questions
PDF
100% (2)
Satish Chandra Memorial School: Case Study Based Questions
4 pages
Practical QP
PDF
No ratings yet
Practical QP
3 pages
Class10 - Practical File
PDF
100% (1)
Class10 - Practical File
24 pages
Lesson Plan Class 9th L1 IT - ITeS
PDF
No ratings yet
Lesson Plan Class 9th L1 IT - ITeS
143 pages
Holiday Homework Class 9
PDF
No ratings yet
Holiday Homework Class 9
2 pages
Class 7 Chapter 8 Internet Services
PDF
No ratings yet
Class 7 Chapter 8 Internet Services
6 pages
IX IT Practical File
PDF
100% (1)
IX IT Practical File
17 pages
Practical File - Class X
PDF
No ratings yet
Practical File - Class X
4 pages
402 Information Tech SQP
PDF
No ratings yet
402 Information Tech SQP
5 pages
ClassX Computerapplication Questionbank
PDF
No ratings yet
ClassX Computerapplication Questionbank
12 pages
Computer Application Sample Paper
PDF
No ratings yet
Computer Application Sample Paper
126 pages
Worksheet of Application Based Question
PDF
0% (1)
Worksheet of Application Based Question
5 pages
Preboard - Computer Application (165) Class 10 - Watermark
PDF
100% (1)
Preboard - Computer Application (165) Class 10 - Watermark
4 pages
CFOA Practical File
PDF
No ratings yet
CFOA Practical File
28 pages
Solution Networking Worksheet
PDF
No ratings yet
Solution Networking Worksheet
6 pages
X IT Practicals - 231011 - 192837
PDF
No ratings yet
X IT Practicals - 231011 - 192837
27 pages
Practical/Project File Question Paper 2020-21 Class X
PDF
No ratings yet
Practical/Project File Question Paper 2020-21 Class X
12 pages
Quarterly Exam: Grade: XI Subject: Computer Science
PDF
100% (1)
Quarterly Exam: Grade: XI Subject: Computer Science
3 pages
Evolution of Networking
PDF
No ratings yet
Evolution of Networking
8 pages
Class IX Holiday Home Work 2024
PDF
No ratings yet
Class IX Holiday Home Work 2024
8 pages
CLASS 3 Holiday Homework
PDF
No ratings yet
CLASS 3 Holiday Homework
1 page
Ai Practical XTH Class
PDF
No ratings yet
Ai Practical XTH Class
21 pages
Class III To X Computer Syllabus PDF
PDF
No ratings yet
Class III To X Computer Syllabus PDF
28 pages
Class X Employability Skill Notes
PDF
No ratings yet
Class X Employability Skill Notes
12 pages
10th Practical
PDF
No ratings yet
10th Practical
39 pages
Lab Task
PDF
100% (1)
Lab Task
5 pages
Sample Paper 1 & 2
PDF
No ratings yet
Sample Paper 1 & 2
8 pages
Office Automation Tools Class 11 MCQ - Annotated
PDF
No ratings yet
Office Automation Tools Class 11 MCQ - Annotated
11 pages
Portfolio
PDF
No ratings yet
Portfolio
12 pages
Class 8 Comp For Deepanshu
PDF
No ratings yet
Class 8 Comp For Deepanshu
1 page
IT Practical File 2024-2025
PDF
50% (2)
IT Practical File 2024-2025
4 pages
Ict For Personal Manaement and School Administration
PDF
100% (1)
Ict For Personal Manaement and School Administration
20 pages
Data Entry and Keyboarding Skills
PDF
No ratings yet
Data Entry and Keyboarding Skills
41 pages
Sumita Arora Solved Exercise of Web Application Development
PDF
100% (6)
Sumita Arora Solved Exercise of Web Application Development
0 pages
CBSE Class 10 Computer Science Worksheet
PDF
100% (1)
CBSE Class 10 Computer Science Worksheet
15 pages
Class 11 IP PT 2 (QP-2)
PDF
No ratings yet
Class 11 IP PT 2 (QP-2)
5 pages
Grade10 QP1
PDF
No ratings yet
Grade10 QP1
8 pages
Office Automation Syllabus
PDF
No ratings yet
Office Automation Syllabus
4 pages
Computer Applications Practical: Microsoft Excel, Word, Powerpoint Worksheets
PDF
No ratings yet
Computer Applications Practical: Microsoft Excel, Word, Powerpoint Worksheets
14 pages
2023-24 It Sample Paper-5
PDF
No ratings yet
2023-24 It Sample Paper-5
7 pages
Unit 3 - DBMS - Ques Bank With Answers
PDF
No ratings yet
Unit 3 - DBMS - Ques Bank With Answers
16 pages
Class VII-ICT Network & Communication-WK 2
PDF
No ratings yet
Class VII-ICT Network & Communication-WK 2
3 pages
Class 9 Employability Skills Notes
PDF
No ratings yet
Class 9 Employability Skills Notes
17 pages
Sample Objective and Outcome For Dbms and Lab
PDF
0% (1)
Sample Objective and Outcome For Dbms and Lab
6 pages
6th Class Notes
PDF
No ratings yet
6th Class Notes
8 pages
Unit2-Digital Spreadsheet (Advanced)
PDF
0% (1)
Unit2-Digital Spreadsheet (Advanced)
11 pages
Class 11 IP Sample Paper Paper
PDF
0% (1)
Class 11 IP Sample Paper Paper
8 pages
Computer Applications IX Only
PDF
No ratings yet
Computer Applications IX Only
7 pages